Security properties and CSP
- 6 May 1996
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 1, 174-187
- https://doi.org/10.1109/secpri.1996.502680
Abstract
Security properties such as confidentiality and authenticity\ud may be considered in terms of the flow of\ud messages within a network. To the extent that this\ud characterisation is justified, the use of a process algebra\ud such as Communicating Sequential Processes (CSP)\ud seems appropriate to describe and analyse them. This\ud paper explores ways in which security properties may\ud be described as CSP specifications, how security mechanisms\ud may be captured, and how particular protocols\ud designed to provide these properties may be analysed\ud within the CSP framework. The paper is concerned\ud with the theoretical basis for such analysis. A sketch\ud verification of a simple example is carried out as an\ud illustration.</pKeywords
This publication has 2 references indexed in Scilit:
- Using temporal logic to specify and verify cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Applying Formal Methods to the Analysis of a Key Management ProtocolJournal of Computer Security, 1992